How to Perform an Information Security Audit

  • CategoryOther
  • TypeTutorials
  • LanguageEnglish
  • Total size5.7 GB
  • Uploaded Bytutsnode
  • Downloads155
  • Last checkedDec. 31st '22
  • Date uploadedDec. 30th '22
  • Seeders 57
  • Leechers52

Infohash : 285F47AC66F8DD9011BA5592D44983E455FA9D50


Description

We are glad to bring you a course to learn how to perform information security audits.

This course is ideal for:

IT and information security professionals who wish to learn techniques on how to assess the security of their information and the vulnerability of their information systems; and
Auditors or others performing assessments who wish to learn more about performing information security audits.

The course will give you the knowledge and tools necessary to perform information security audits, starting from how to plan them, how to perform and how to report on the results of the engagement. It will teach you about which threats to assess and which controls should be put in place.

It is taught by Adrian Resag, an experienced and CISA certified information security auditor who has decades of experience evaluating information security, IT and ISO 27001 in many organizations.

The course covers:

Performing Information Security Audits

Planning Engagements

Understand how to properly plan engagements by determining their objectives, criteria and scope.
Know how to create working papers to document an audit and learn about different ways to staff an audit.

Performing Engagements

Learn how to collect engagement information and then analyze and evaluate it. Learn how to supervise engagements.

Communicating Progress and Results

Learn how to communicate engagement results and the process of acceptance of risks. Learn how to monitor progress on the implementation status of internal audit recommendations.

Information Security Threats and Controls

Threats to information security

Know about which threats to information security should be assessed, including threats to the integrity of data, confidentiality and the availability of data.
Be able to evaluate privacy risks, risks from smart devices, insider threats, illicit software threats and cybersecurity threats amongst others.
Be able to evaluate risks by using the Asset-Threat-Vulnerability triangle.

Controls over information security

Know about the different types of information security controls, including IT general controls.
Be able to put in place a solid governance over information security, such as by putting in place IT management and governance controls.
Be able to implement the segregation of IT duties and IT departmentalization, an information security framework and cybersecurity governance and policies.
Be able to apply the Three Lines of Defense Model in cybersecurity.
Learn about controls such as identity access management and authentication, encryption and firewalls, data privacy and protection controls.
Know about application and access controls, technical IT infrastructure controls, external connections controls and 3rd party information security controls.

Who this course is for:

Current or future IT and information security professionals who wish to learn techniques on how to assess the security of their information and the vulnerability of their information systems.
Auditors or others performing assessments who wish to learn more about performing information security audits.

Requirements

No prior experience or knowledge is required.

Last Updated 11/2022

Files:

How to Perform an Information Security Audit [TutsNode.net] - How to Perform an Information Security Audit 1 - Information Security Threats and Controls
  • 27 - Cybersecurity Threats.mp4 (415.0 MB)
  • 16 - Types of Information Security Controls.mp4 (189.8 MB)
  • 20 - Data Protection Framework.mp4 (151.1 MB)
  • 3 - IT General Controls.mp4 (144.3 MB)
  • 37 - Illicit Software Use.mp4 (126.5 MB)
  • 38 - Insider Threat.mp4 (125.1 MB)
  • 10 - Access and Authorization Controls Risks.mp4 (114.3 MB)
  • 6 - Threats and Controls to Physical Security.mp4 (113.0 MB)
  • 33 - Application and Access Controls.mp4 (110.8 MB)
  • 32 - IT Management and Governance Controls Against Cybersecurity Threats.mp4 (110.2 MB)
  • 11 - Identity Access Management Activities.mp4 (102.3 MB)
  • 22 - Smart Devices and Their Risks.mp4 (101.6 MB)
  • 19 - Data Privacy and Protection.mp4 (97.5 MB)
  • 13 - IT Departmentalization.mp4 (96.6 MB)
  • 36 - Verifying 3rd Party Information Security.mp4 (95.3 MB)
  • 41 - Cybersecurity Governance and Policies.mp4 (95.0 MB)
  • 4 - Segregation of IT Duties.mp4 (84.5 MB)
  • 42 - Information Security Framework.mp4 (81.3 MB)
  • 18 - Firewalls.mp4 (76.9 MB)
  • 1 - Information Security.mp4 (72.5 MB)
  • 25 - AssetThreatVulnerability Triangle.mp4 (61.6 MB)
  • 43 - The Three Lines of Defense Model in Cybersecurity.mp4 (56.9 MB)
  • 35 - External Connections Controls.mp4 (51.2 MB)
  • 9 - Identity Access Management.mp4 (42.2 MB)
  • 2 - Data Integrity Confidentiality and Data Availability.mp4 (39.9 MB)
  • 34 - Technical IT Infrastructure Controls.mp4 (39.1 MB)
  • 17 - Encryption.mp4 (38.1 MB)
  • 24 - Question on Data Protection Framework.mp4 (34.7 MB)
  • 23 - Question on Smart Devices and Their Risks.mp4 (30.2 MB)
  • 14 - Question on IT Departmentalization 1.mp4 (28.9 MB)
  • 26 - Cybersecurity Risks.mp4 (22.2 MB)
  • 15 - Question on IT Departmentalization 2.mp4 (22.1 MB)
  • 5 - Question on Segregation of IT Duties.mp4 (17.3 MB)
  • 44 - Question on Cybersecurity Governance and Policies.mp4 (17.2 MB)
  • 40 - Question on Data Privacy and Protection.mp4 (14.8 MB)
  • 8 - Question on Threats and Controls to Physical Security.mp4 (14.2 MB)
  • 7 - Question on Threats and Controls to Physical Security.mp4 (12.9 MB)
  • 21 - Question on Data Protection Framework.mp4 (12.6 MB)
  • 12 - Authentication.mp4 (12.0 MB)
  • 29 - Question on Cybersecurity Threats 2.mp4 (7.8 MB)
  • 30 - Question on Cybersecurity Threats 3.mp4 (6.3 MB)
  • 31 - Question on Cybersecurity Threats 4.mp4 (4.6 MB)
  • 39 - Question on Insider Threat.mp4 (3.3 MB)
  • 28 - Question on Cybersecurity Threats 1.mp4 (3.1 MB)
2 - Performing Information Security Audits
  • 53 - Workflow of an Engagement.mp4 (244.6 MB)
  • 51 - Engagement Work Programs.mp4 (230.6 MB)
  • 58 - Process Maps and Benchmarking.mp4 (142.7 MB)
  • 74 - Monitoring Progress.mp4 (141.9 MB)
  • 59 - RiskControl Matrix.mp4 (137.5 MB)
  • 61 - Engagement Supervision.mp4 (129.4 MB)
  • 67 - Quality of Communications.mp4 (128.2 MB)
  • 57 - Interview Approaches and Skills.mp4 (121.0 MB)
  • 63 - Supervision Best Practices.mp4 (119.8 MB)
  • 69 - Best Practices on Communicating Recommendations.mp4 (118.3 MB)
  • 46 - Engagement Scope.mp4 (113.5 MB)
  • 45 - Engagement Planning.mp4 (94.7 MB)
  • 49 - Coverage of Significant Risks.mp4 (92.7 MB)
  • 66 - Communicating Engagement Results.mp4 (83.8 MB)
  • 73 - Acceptance of Risk.mp4 (75.6 MB)
  • 54 - Audit Techniques for Gathering Information.mp4 (74.8 MB)
  • 71 - Internal Audit Opinions.mp4 (74.0 MB)
  • 55 - Walkthroughs.mp4 (71.7 MB)
  • 52 - Questions on Engagement Work Programs.mp4 (70.3 MB)
  • 60 - Building a RiskControl Matrix.mp4 (51.5 MB)
  • 64 - Reviewing Working Papers.mp4 (45.2 MB)
  • 72 - Questions on Internal Audit Opinions.mp4 (42.5 MB)
  • 68 - Communicating Progress.mp4 (39.9 MB)
  • 47 - Engagement Objectives.mp4 (39.3 MB)
  • 50 - Questions on Coverage of Significant Risks.mp4 (39.2 MB)
  • 70 - Communicating Recommendations.mp4 (39.0 MB)
  • 62 - Performance Appraisals.mp4 (30.6 MB)
  • 75 - Questions on Monitoring Progress.mp4 (28.5 MB)
  • 56 - Questions on Walkthroughs.mp4 (25.6 MB)
  • 65 - Questions on Reviewing Working Papers.mp4 (16.4 MB)
  • 48 - Questions on Engagement Objectives.mp4 (14.6 MB)
  • TutsNode.net.txt (0.1 KB)
  • [TGx]Downloaded from torrentgalaxy.to .txt (0.6 KB)
  • .pad
    • 0 (19.3 KB)
    • 1 (427.9 KB)
    • 2 (403.8 KB)
    • 3 (163.4 KB)
    • 4 (874.2 KB)
    • 5 (728.7 KB)
    • 6 (343.9 KB)
    • 7 (70.4 KB)
    • 8 (477.0 KB)
    • 9 (591.7 KB)
    • 10 (819.7 KB)
    • 11 (542.5 KB)
    • 12 (957.4 KB)
    • 13 (984.2 KB)
    • 14 (232.6 KB)
    • 15 (717.4 KB)
    • 16 (666.5 KB)
    • 17 (494.5 KB)
    • 18 (978.8 KB)
    • 19 (170.4 KB)
    • 20 (851.7 KB)
    • 21 (750.3 KB)
    • 22 (399.0 KB)
    • 23 (474.9 KB)
    • 24 (374.5 KB)
    • 25 (723.2 KB)
    • 26 (1,007.7 KB)
    • 27 (328.4 KB)
    • 28 (278.9 KB)
    • 29 (533.3 KB)
    • 30 (214.9 KB)
    • 31 (712.5 KB)
    • 32 (112.4 KB)
    • 33 (424.0 KB)
    • 34 (237.4 KB)
    • 35 (977.9 KB)
    • 36 (556.4 KB)
    • 37 (318.5 KB)
    • 38 (672.5 KB)
    • 39 (429.7 KB)
    • 40 (92.5 KB)
    • 41 (46

Code:

  • udp://open.stealth.si:80/announce
  • udp://tracker.tiny-vps.com:6969/announce
  • udp://fasttracker.foreverpirates.co:6969/announce
  • udp://tracker.opentrackr.org:1337/announce
  • udp://explodie.org:6969/announce
  • udp://tracker.cyberia.is:6969/announce
  • udp://ipv4.tracker.harry.lu:80/announce
  • udp://tracker.uw0.xyz:6969/announce
  • udp://opentracker.i2p.rocks:6969/announce
  • udp://tracker.birkenwald.de:6969/announce
  • udp://tracker.torrent.eu.org:451/announce
  • udp://tracker.moeking.me:6969/announce
  • udp://tracker.dler.org:6969/announce
  • udp://9.rarbg.me:2970/announce